Yet Another French Exception: The Legal, Cultural, And Political Dimensions Of France’S Support For The Digital Right To Be Forgotten, Zarine Kharazian

Undergraduate Honors Theses

In 2015, the European Court of Justice established an online “right to be forgotten” in Europe. Under this right to be forgotten, individuals may request that search engines delist links that reference their personal information from search results. Search engines need not grant these requests, but they are now obligated to review them.

While the Court's decision to establish the right to be forgotten certainly ignited a debate among Western privacy scholars and policymakers hailing from both sides of the Atlantic, no country has participated in the debate with as much fervor as has France. This thesis addresses the ...

Upholding Citizens’ Privacy In The Use Of Stingray Technology: Is New York Behind?, Samantha Hazen

Pace Law Review

This Comment will argue that New York should follow the federal agencies’ and states’ leads by imposing a warrant requirement supported by probable cause on local and state agencies that wish to use Stingray technology in their investigations. The first section will explore Stingray technology and how it works. The second section will frame the issue and describe New York’s current standard. The third section will discuss the judicial response to the issue and how New York courts seem to place the burden of upholding privacy on the citizen, instead of the government. The third section will also discuss ...

Georgia State University Law Review

Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.

Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls ...

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started ...

Dignity: A Journal on Sexual Exploitation and Violence

Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones

Duke Law & Technology Review

Under the Supreme Court’s holding in Tinker v. Des Moines Independent Community School District, public schools may only restrict student speech where the speech is reasonably forecasted to cause a “substantial and material disruption.” With online forums calling into question who may control speech and forecast its impact, the circuit courts have granted public schools broad authority to monitor, and punish, their students for online activity that occurs off-campus. The Supreme Court recently declined the opportunity to reverse this disturbing trend by denying certiorari for Bell v. Itawamba County. As a result, questions remain unanswered regarding students’ right to ...

What's In A Name: Cable Systems, Filmon, And Judicial Consideration Of The Applicability Of The Copyright Act's Compulsory License To Online Broadcasters Of Cable Content, Kathryn M. Boyd

Duke Law & Technology Review

The way we consume media today is vastly different from the way media was consumed in 1976, when the Copyright Act created the compulsory license for cable systems. The compulsory license allowed cable systems, as defined by the Copyright Act, to pay a set fee for the right to air television programming rather than working out individual deals with each group that owned the copyright in the programming, and helped make television more widely accessible to the viewing public. FilmOn, a company that uses a mini-antenna system to capture and retransmit broadcast network signals, is now seeking access to the ...

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids ...

Catholic University Journal of Law and Technology

How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs

Catholic University Journal of Law and Technology

This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.

Catholic University Journal of Law and Technology

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...